Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZRm4W-K4CtjLxcAQ@llamedos.localdomain>
Date: Sun, 1 Oct 2023 19:20:11 +0100
From: Ken Moffat <zarniwhoop@...world.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2023-5217: Heap buffer overflow in vp8
 encoding in libvpx

On Thu, Sep 28, 2023 at 11:37:23AM -0700, Alan Coopersmith wrote:
> Google has announced another media parsing bug, this time correctly documenting
> both the base library and Chrome versions affected in the CVE.
> 
> https://www.cve.org/CVERecord?id=CVE-2023-5217 states:
> 
>    Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to
>    117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially
>    exploit heap corruption via a crafted HTML page.
>    (Chromium security severity: High)
> 

Does anyone know how far back libvpx is affected ?  Asking because
seamonkey-2.53.17.1 is apparently shipping a version of libvpx-1.7.0
from 2020 and I'm told it no longer builds against system
libvpx-1.13.1, although a recent version apparently built against
libvpx-1.11.0.

ĸen
-- 
  Men marched away, Vimes. And men marched back. How glorious the
  battles would have been that they never had to fight! -- Jingo

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.